457 research outputs found
Recommended from our members
Trust Management for P2P application in Delay Tolerant Mobile Ad-hoc Networks. An Investigation into the development of a Trust Management Framework for Peer to Peer File Sharing Applications in Delay Tolerant Disconnected Mobile Ad-hoc Networks.
Security is essential to communication between entities in the internet. Delay tolerant and disconnected Mobile Ad Hoc Networks (MANET) are a class of networks characterized by high end-to-end path latency and frequent end-to-end disconnections and are often termed as challenged networks. In these networks nodes are sparsely populated and without the existence of a central server, acquiring global information is difficult and impractical if not impossible and therefore traditional security schemes proposed for MANETs cannot be applied. This thesis reports trust management schemes for peer to peer (P2P) application in delay tolerant disconnected MANETs. Properties of a profile based file sharing application are analyzed and a framework for structured P2P overlay over delay tolerant disconnected MANETs is proposed. The framework is implemented and tested on J2ME based smart phones using Bluetooth communication protocol. A light weight Content Driven Data Propagation Protocol (CDDPP) for content based data delivery in MANETs is presented. The CDDPP implements a user profile based content driven P2P file sharing application in disconnected MANETs. The CDDPP protocol is further enhanced by proposing an adaptive opportunistic multihop content based routing protocol (ORP). ORP protocol considers the store-carry-forward paradigm for multi-hop packet delivery in delay tolerant MANETs and allows multi-casting to selected number of nodes. Performance of ORP is compared with a similar autonomous gossiping (A/G) protocol using simulations. This work also presents a framework for trust management based on dynamicity aware graph re-labelling system (DA-GRS) for trust management in mobile P2P applications. The DA-GRS uses a distributed algorithm to identify trustworthy nodes and generate trustable groups while isolating misleading or untrustworthy nodes. Several simulations in various environment settings show the effectiveness of the proposed framework in creating trust based communities. This work also extends the FIRE distributed trust model for MANET applications by incorporating witness based interactions for acquiring trust ratings. A witness graph building mechanism in FIRE+ is provided with several trust building policies to identify malicious nodes and detect collusive behaviour in nodes. This technique not only allows trust computation based on witness trust ratings but also provides protection against a collusion attack. Finally, M-trust, a light weight trust management scheme based on FIRE+ trust model is presented
Assessment of access to health services and vulnerabilities of female fish traders in the Kafue Flats, Zambia: analysis report
Under the regional programme Fisheries and HIV/AIDS in Africa: Investing in Sustainable Solutions, the WorldFish Center conducted this study on access to health services and vulnerabilities of female fish traders in the Kafue Flats floodplains in Zambia. This report outlines and analyses the particular vulnerabilities of female fish traders in the Kafue Flats fishery and formulates recommendations to facilitate stakeholder uptake of strategic responses to tackle the drivers of the epidemic in fishing communities and improve the livelihoods of fisher folk and fish traders in the Kafue Flats and other fisheries in Zambia. (pdf contains 55 pages
Assessment of access to health services and vulnerabilities of female fish traders in the Kafue Flats, Zambia: analysis report
Under the regional programme Fisheries and HIV/AIDS in Africa: Investing in Sustainable Solutions, the WorldFish Center conducted this study on access to health services and vulnerabilities of female fish traders in the Kafue Flats floodplains in Zambia. This report outlines and analyses the particular vulnerabilities of female fish traders in the Kafue Flats fishery and formulates recommendations to facilitate stakeholder uptake of strategic responses to tackle the drivers of the epidemic in fishing communities and improve the livelihoods of fisher folk and fish traders in the Kafue Flats and other fisheries in Zambia.Women, Fishermen, Trade, Vulnerability, Viral diseases, Zambia,
A Distributed Architecture for Spam Mitigation on 4G Mobile Networks
The 4G of mobile networks is considered a technology-opportunistic and user-centric system combining the economical and technological advantages of
various transmission technologies. Part of its new architecture dubbed as the System Architecture Evolution, 4G mobile networks will implement an evolved packet core. Although this will provide various critical advantages, it will however expose telecom networks to serious IP-based attacks. One often adopted solution by the industry to mitigate such attacks is based on a centralized security architecture. This centralized approach nonetheless, requires large processing resources to handle huge amount of traffic, which results in a significant over dimensioning problem in the centralized nodes causing this approach to fail from achieving its security task.\\
In this thesis, we primarily contribute by highlighting on two Spam flooding attacks, namely RTP VoIP SPIT and SMTP SPAM and demonstrating, through simulations and comparisons, their feasibility and DoS impact on 4G mobile networks and subsequent effects on mobile network operators. We further contribute by proposing a distributed architecture on the mobile architecture that is secure by mitigating those attacks, efficient by solving the over dimensioning problem and cost-effective by utilizing `off the shelf' low-cost hardware in the distributed nodes. Through additional simulation and analysis, we reveal the viability and effectiveness of our approach
Mobile Ad-Hoc Networks
Being infrastructure-less and without central administration control, wireless ad-hoc networking is playing a more and more important role in extending the coverage of traditional wireless infrastructure (cellular networks, wireless LAN, etc). This book includes state-of-the-art techniques and solutions for wireless ad-hoc networks. It focuses on the following topics in ad-hoc networks: quality-of-service and video communication, routing protocol and cross-layer design. A few interesting problems about security and delay-tolerant networks are also discussed. This book is targeted to provide network engineers and researchers with design guidelines for large scale wireless ad hoc networks
Humanising policy from ‘Warriors to Guardians’: An evaluation of Coordinated Management and Emergency Response Assemblages in Ireland and the US
Coordinated Management and Emergency Response Assemblages (CMaERAs) are complex, multi-faceted, institutionalised networks of emergency response agencies, people, processes, technologies, histories, geographies and cultures which shape the strength of inter-agency coordination and emergency response. This thesis explores how a variety of actors, actants and technologies involved in emergency management assemble and organise. The methodology adopted is qualitative and uses two case studies to evaluate how CMaERA oscillate from their organised shape as dictated by policy to a new shape emanating from the needs of a response call. The case studies were: the Irish Emergency Management Assemblages (IEMA) response to the winter storms of 2015/2016 and the United States Emergency Management Assemblages (USEMA) response to the Boston Marathon Bombing in 2013. Fifty-one semi-structured interviews of key stakeholders and emergency response agents were conducted and supported by an interpretive analysis of key policy documents. By adopting assemblage theory and applying it to the empirical findings of the IEMA and USEMA, conceptualised within Foucauldian and Agambien understanding of power and sovereignty, this thesis offers a theoretical and philosophical framework to study emergency services, their interactions and power dynamics while keeping in sight their histories, cultures and current situations. This resulted in recognising that CMaERAs re-shape and oscillate position regularly to ensure that response is adequate and efficient. These movements are influenced both by the situation, inter-agency trust, and previous working relationships, but also from external factors, such as the institutionalisation and siloed manner of agencies, (in)formalisation, their relationship with the government, technological advancements, data analytics but also human nature. These broad factors affect inter-agency coordination and collaboration by creating barriers preventing the development of a true Coordinated Management and Emergency Response Assemblage. Finally, it provides three wider contributions to knowledge: expansion of the term ‘vulnerability’, development of embodied assemblages, and the identification of three urban factors which affect assemblage oscillation
"Speaking with one voice": the Somali Retailers' Association - rights and xenophobia in Cape Town's townships
In the wake of extreme xenophobic violence, which swept South Africa in 2008, a group of Somali refugees resident in Cape Town formed the Somali Retailers’ Association (SRA) as a mutual support network made up of those who were targeted by xenophobes most: Somalis involved in informal sector trade in the townships. This study investigates the networks of targeted populations, analysing how this Association helps to mitigate the impact of xenophobia on the lives of its members
Erkennung und Vermeidung von Fehlverhalten in fahrzeugbasierten DTNs
Delay- and Disruption-Tolerant Networks (DTNs) are a suitable technology for many applications when the network suffers from intermittent connections and significant delays. In current vehicular networks, due to the high mobility of vehicles, the connectivity in vehicular networks can be highly unstable, links may change or break soon after they have been established and the network topology varies significantly depending on time and location. When the density of networked vehicles is low, connectivity is intermittent and with only a few transmission opportunities. This makes forwarding packets very difficult. For the next years, until a high penetration of networked vehicles is realized, delay-tolerant methods are a necessity in vehicular networks, leading to Vehicular DTNs (VDTNs). By implementing a store-carry-forward paradigm, VDTNs can make sure that even under difficult conditions, the network can be used by applications. However, we cannot assume that all vehicles are altruistic in VDTNs. Attackers can penetrate the communication systems of vehicles trying their best to destroy the network. Especially if multiple attackers collude to disrupt the network, the characteristics of VDTNs, without continuous connectivity, make most traditional strategies of detecting attackers infeasible. Additionally, selfish nodes may be reluctant to cooperate considering their profit, and due to hard- or software errors some vehicles cannot send or forward data. Hence, efficient mechanisms to detect malicious nodes in VDTNs are imperative. In this thesis, two classes of Misbehavior Detection Systems (MDSs) are proposed to defend VDTNs against malicious nodes. Both MDSs use encounter records (ERs) as proof to document nodes' behavior during previous contacts. By collecting and securely exchanging ERs, depending on different strategies in different classes of MDSs, a reputation system is built in order to punish bad behavior while encouraging cooperative behavior in the network. With independently operating nodes and asynchronous exchange of observations through ERs, both systems are very well suited for VDTNs, where there will be no continuous, ubiquitous network in the foreseeable future. By evaluating our methods through extensive simulations using different DTN routing protocols and different realistic scenarios, we find that both MDS classes are able to efficiently protect the system with low overhead and prevent malicious nodes from further disrupting the network.In Netzwerken mit zeitweisen Unterbrechungen oder langen Verzögerungen sind Delay- and Disruption-Tolerant Networks (DTNs) eine geeignete Technologie für viele Anwendungen. Die Konnektivität in Fahrzeugnetzen ist bedingt durch die hohe Mobilität und die geringe Verbreitung von netzwerkfähigen Fahrzeugen oft instabil. Bis zur flächendeckenden Verbreitung von netzwerkfähigen Fahrzeugen ist es daher zwingend notwendig auf Methoden des Delay Tolerant Networking zurückzugreifen um die bestmögliche Kommunikation zu gewährleisten. In diesem Zusammenhang wird von Vehicular Delay Tolerant Networks (VDTNs) gesprochen. Durch das Store-Carry-Forward-Prinzip kann ein VDTN Kommunikation für Anwendungen ermöglichen. Allerdings ist davon auszugehen, dass sich nicht alle Fahrzeuge altruistisch verhalten: Angreifer können Fahrzeuge übernehmen und das Netzwerk attackieren oder Knoten sind aus egoistischen Motiven oder auf Grund von Defekten unkooperativ. Verfahren, die Fehlverhalten in stabilen Netzen durch direkte Beobachtung erkennen können, sind in VDTNs nicht anwendbar. Daher sind Methoden, die Fehlverhalten in VDTNs nachweisen können, zwingend erforderlich. In dieser Arbeit werden zwei Klassen von Misbehavior Detection Systems (MDSs) vorgestellt. Beide Systeme basieren auf Encounter Records (ERs): Nach einem Kontakt tauschen zwei Knoten kryptografisch signierte Meta-Informationen zu den erfolgten Datentransfers aus. Diese ERs dienen bei darauffolgenden Kontakten mit anderen Netzwerkteilnehmern als vertrauenswürdiger Nachweis für das Verhalten eines Knotens in der Vergangenheit. Basierend auf der Auswertung gesammelter ERs wird ein Reputationssystem entwickelt, das kooperatives Verhalten belohnt und unkooperatives Verhalten bestraft. Dauerhaft unkooperative Knoten werden aus dem Netzwerk ausgeschlossen. Durch den asynchronen Austausch von Informationen kann jeder Knoten das Verhalten seiner Nachbarn selbstständig und unabhängig evaluieren. Dadurch sind die vorgestellten MDS-Varianten sehr gut für den Einsatz in einem VDTN geeignet. Durch umfangreiche Evaluationen wird gezeigt, dass sich die entwickelten MDS-Verfahren für verschiedene Routingprotokolle und in unterschiedlichen Szenarien anwenden lassen. In allen Fällen ist das MDS in der Lage das System mit geringem Overhead gegen Angreifer zu verteidigen und eine hohe Servicequalität im Netzwerk zu gewährleisten
- …